How to Deploy Vista SecurityPiece by Piece

By Lisa Vaas |
Posted 06-06-2007

WASHINGTONThere's a bushel of security enhancements in Windows Vistathey comprise the most important aspect of the new operating system and the most compelling reason to upgrade, analysts saybut they're not all perfect, nor are they silver bullets.

Vista's BitLocker encryption, for example, is restricted from working alongside virtualization software, doesn't encrypt multiple disk volumes, and only ships to customers on Microsoft's Software Assurance plan or with the Ultimate version of the operating system.

Each of Vista's security functions has similar quibbles associated with itbe they lack of features or license quirksthat enterprises must ponder. Given that, how does an enterprise determine which Vista security features to deploy and how to best deploy them?

Gartner analyst Neil MacDonald gave Gartner's take here on June 4 at the research company's IT Security Summit. During his presentation, titled "Planning and Deploying the Security Features of Windows Vista," MacDonald covered UAC (User Access Control), BitLocker, NAP (Network Access Protection), ASLR (Address Space Layout Randomization) and Windows Defenderthe five heavyweights in Vista's new security lineupproviding pros, cons and advice on implementing each of those security features as well as other features that don't get as much attention.

But wait, you say. You're not planning to deploy Vista any time soon, just like the majority of Windows users? After all, Microsoft has pledged security support for some variant of Windows XP until the end of 2013, making the sun's setting on XP far from imminent. Fair enough, but bear in mind it's not too early to start thinking of your enterprise's Vista future, given that application vendors aren't guaranteed to support XP for as long as Microsoft plans to.

"The bigger risk is not [the end of support and security fixes] from Microsoft but from application vendors," MacDonald said.

With that in mind, eWEEK has put together five articles, each covering one of the top five Vista security features and Gartner's take on its pros, cons and how to implement it, based on the company's presentation at its IT Security Summit.